Security
Last updated
Roovet uses a defense-in-depth approach to protect accounts, content, and transactions across Search, News, Shop, Books, Wallet, Developers/API, Suite/CRM & Flow, Virtual Rep & Telephony, Mail, and Providers (“Pros”).
1) Principles
Copy link- Least privilege, separation of duties, and audited access to sensitive systems.
- Secure defaults for APIs, CSRF protection, and strong session management.
- Continuous monitoring, patching, and dependency management.
2) Transport & Storage
Copy link- TLS for data in transit; modern cipher suites and HSTS where supported.
- Industry-standard hashing for credentials; encryption at rest for sensitive fields and backups.
- Key management and secret rotation practices for infrastructure and integrations.
3) Account Security
Copy linkWe support strong passwords and device management. Visit Account → Devices to review signed-in devices and revoke sessions. MFA may be required for sensitive actions in some areas.
4) Application Security
Copy link- CSRF protection for web forms and JSON APIs; content security best practices.
- Rate limiting, idempotency keys, and abuse detection for API write paths.
- Webhook signing with X-Roovet-Signature and X-Roovet-Timestamp.
- Secure file handling for uploads and public link controls in Flow/Drive.
5) Secure Development Lifecycle
Copy link- Code review, dependency scanning, and continuous integration checks.
- Periodic application testing and configuration hardening.
- Change management with rollback strategies and audit trails.
6) Wallet, Payments & Orders
Copy linkThe Wallet is a stored-value feature. Payment data is handled with trusted providers; we do not store full card numbers. Anti-fraud protections, dispute handling, and secure payout flows help reduce risk.
7) Virtual Rep & Telephony
Copy linkWe require opt-in where applicable, support opt-out keywords, and log consent. Calls/SMS use verified routes when possible. Abuse, spam, and unlawful messaging are prohibited and monitored.
8) Operations & Reliability
Copy link- Monitoring, alerting, backups, and tested recovery procedures.
- Capacity planning and DDoS-aware edge protections.
- Public status updates on Status.
9) Responsible Disclosure
Copy linkIf you discover a vulnerability, please report it responsibly with sufficient detail to reproduce. Avoid accessing other users’ data, exfiltrating information, or disrupting services. We’ll acknowledge valid reports and work to remediate promptly.
10) Contact & Incident Response
Copy linkFor urgent security matters, use the contact methods listed on our site and include “Security” in the subject. In the event of a notifiable incident, we will provide notices consistent with legal requirements.